Tuesday, December 31, 2019

Corporate Social Responsibility ( Csr ) - 1216 Words

The idea of a perfectly clear and all-encompassing definition of corporate social responsibility (CSR) has been much deliberated and remains controversial. The research of Marrewijk (2013, p.95) elaborated on the significance of this ongoing debate among academics, consultants and corporate executives which results in creating, supporting and criticising of different concepts. This essay illuminates CSR principles, consider different definitions and concepts and relates it to my definition. Furthermore, it supports companies’ interest in CSR only for profit maximisation. Notably, the ideals which Friedman (1962) clearly stressed: ‘Few trends could so thoroughly undermine the very foundations of our free society as the acceptance by corporate officials of a social responsibility other than to make as much money for their stockholders as possible’ (p.133). He argued the desideratum of any other social responsibility for businessmen other than that of making maximum profits for their stockholders to exist. He reasoned the unavailability of determinant factors of such social responsibilities, taking into account that it is neither efficient nor reliable to enforce nebulous social responsibilities on corporations. Consequently, they opine that the concept of CSR is inimical to sound business practices and strays away from the basics of wealth creation (Clement-Jones, 2005; Murray, 2005; Jamli and Sidani, 2008). These academics feel businesses should involve in CSR â€Å"only to theShow MoreRelatedCorporate Social Responsibility And Csr1566 W ords   |  7 PagesSocial responsibility or also called Corporate Social Responsibility (CSR)- is the firm’s engagement (voluntarily initiated) in and its compliance (legally mandated) to environmental, social, and governance issues (The Foundation, 2014). Also, is based on stakeholder’s needs being financially sustainable, and CSR can come from both corporate or not-to-profit organizations. CSR has seven categories; Leadership, vision and values; Marketplace activities; Workforce activities; Supply chain activities;Read MoreCorporate Social Responsibility ( Csr )1167 Words   |  5 PagesCorporate Social Responsibility Introduction Corporate social responsibility (CSR) is a concept which is also known as corporate citizenship, corporate conscience or in a simple way a responsible business. It is an integrated concept of self-regulatory business model for any organisation. Corporate Social Responsibility has been in practice for more than fifty years now, which has been adopted not only by domestic companies but also by transnational company with voluntary CSR initiativesRead MoreCorporate Social Responsibility : Csr1232 Words   |  5 PagesCorporate social responsibility has become a buzzword within the industry in the last few years. Following the financial market crash investors and stakeholders began looking at corporations to act more socially responsible. The meaning of social responsibility differs across regions. Western countries are the ones who are pushing for corporate social responsibility -thesis-- A broad overview at corporate social responsibility (CSR) looks to corporations to make a change in the society or the environmentRead MoreCsr : Corporate Social Responsibility1598 Words   |  7 Pages CSR stands for Corporate Social Responsibility. Corporate Social Responsibility (CSR) is defined by many groups like, Tata steel, Coca Cola, Reliance, Videocon etc. Although they all stand for similar meanings connecting to taking responsibilities of the society as a business individual, its definition has been getting broader from a established point of view, corporate social responsibility is a type of business instruction included in a business demonstration. CSR policy functions as a self-regulatoryRead MoreCsr : Corporate Social Responsibility Essay1285 Words   |  6 PagesCSR stands for Corporate Social Responsibility and it is a concept with many definitions and practices and also a buzzword in the media. In general, corporate social responsibility is the policies and progra ms of business corporations which tend to benefit society while improving a corporation’s public image and profitability at the same time. The meaning of it is implemented in different countries and companies differently. Warren Buffet said that it takes 20 years to build a reputation and onlyRead MoreCorporate Social Responsibility ( Csr )863 Words   |  4 Pagestechnology in the last century. The term of Corporate Social Responsibility appears more often into public’s concerned and it has become a hot issue in recent years. This essay is going to discuss and provide an overview of corporate social responsibility (CSR) by debate some key issue in this area. 1.2 What is Corporate Social Responsibility? In 1953, Bowen’s Social Responsibility of the Businessman firstly discusses the idea of corporate social responsibility. He states the relationship between societyRead MoreCorporate Social Responsibility ( Csr )1314 Words   |  6 PagesSocial responsibility has become a primal interest to the humankind for the past two decades. In the earlier days, the firms and organizations concentrated only on the financial part of the business and ignored the ethical, social and moral sectors. But in the recent times, the businesses are getting a grip of the significance of the social, ecological and environmental effects on their success. This has resulted in the emerging interactions between organizations and social segments thus giving riseRead MoreCorporate Social Responsibility ( Csr )1173 Words   |  5 Pages Corporate Social Responsibility (CSR) is highly important to Millennials. If a company is lacking a CSR plan, now it a good time to start one. Millennials are looking for ways in making a positive impact on the world and are expecting the same from companies. They are looking for companies that contribute to the betterment of communities and the environment. Millennials put great value in supporting such brands, companies and organizations that share these values. Companies without a CSR in placeRead MoreCorporate Social Responsibility : Csr979 Words   |  4 PagesThe notion of Corporate Social Responsibility is a phenomenon globally known for many years. In spite of the fact that CSR has been neglected for quite a long time, nowadays several authors deal with this issue, as revealed by the development of theories in recent years concerning the topic. In spite of the fact that there has been a huge growth of literature it is still impossible to simply define CSR. Many definitions trying to capture the concept of CSR exist, but their content varies (MattenRead MoreCorporate Social Responsibility ( Csr )1370 Words   |  6 Pagesmore attention on the concept of Corporate Social Responsibility (CSR). The core issue is the appropriate responsibility of business. In as much as firms ought to obey the law, but beyond complete compliance with environmental laws, the question is whether firms have extra social responsibilities to commit part of their resources to environmental preservation voluntarily. This memo provides an exploratory investigation of the link between corporate social responsibility and the benefits accruing to a

Monday, December 23, 2019

A Ladys Story - Anton Chekhov - 1160 Words

Name: Professor: Course: A Ladys Story The theme of the story is about love, attraction and responding to obstacles in the course of love. It is true that the course of true love does not run smoothly and this strikes at the heart chords of all who reads it. The story is set between an aristocratic lady Natalya Vladimirovna and a poor man Pyotr Sergeyitch who have a deep affection for one another, during haymaking season which is in the summer months. We feel the youth, energy and freshness of the warmth of this season. There is a thunderstorm which is threatening and eventually bursts upon them.†¦show more content†¦It would have been good to see her character well balanced and set on something that was out of her control. She had a lot to learn and had a lot to offer in return. One wise man once said â€Å"It is better to be hated for what you are than to be loved for what you are not† . Unfortunately Pyotr fell into Natalyas category of a hero of modern romance which was timid, spiritless, lazy and oversensitive. Pyotr at the end of this story fits this description and looks like a broken man. The story ignites the senses to the past when she smells the hay and has nostalgic, warm feelings towards the past. At this po int in the story she realises the true loss of her love and mourns it. We cannot go back in time, we have to live in the present reality. Her father dies, she ages. Her memory remains strong and clear but she sees the present day as cold and bleak. They meet again on her territory at her house and he is staring at the fire and the comfort he is getting from its warmth. In many ways both are driven by the memory of the past. They both long for what had passed away between them and sadly what life refused them now. Rank and wealth are not thought about now in her eyes. She releases her emotions in an outburst of tears, both sharing feelings of sorrow for each other. Could this not have been a perfect opportunity for reconciliation and renewal? This time instead of laughing together they are crying together. She isShow MoreRelatedGender Roles Of Anton Chekhov s Works2015 Words   |  9 PagesGender Roles in Anton Chekhov’s Works In 19th century Russian literature there was often a gender inequality depicted between the male and female characters. Women were expected to get married, start a family, and obey their husbands. Women often made sacrifices and married men they weren’t fond of in order to support their families. Anton Chekhov’s writing questions these gender relationships. The female characters have a strong presence within Chekhov’s works, and they transcend typical gender

Sunday, December 15, 2019

Privacy and Twitter Free Essays

Executive Summary Twitter Inc. was established in 2006 in California, United States. It provides free services to users, which enables them to send short messages (up to 140 characters long) called â€Å"tweets† to keep their friends and followers up-to-date with what they are doing. We will write a custom essay sample on Privacy and Twitter or any similar topic only for you Order Now It helps users to share information with the rest of the world. Twitter experienced rapid growth worldwide and became one of the most popular social networking and micro-blogging sites in 2010. Although the company gained substantial popularity, its main sources of revenue are still from venture capital and promoted tweets. Twitter’s long-term survival depends on its own ability to generate revenue. The founders of the company want to know how to open up more channels to generate revenue, while respecting users’ privacy concern. After viewing Facebook and Google’s privacy missteps, Twitter and its partners Google and Microsoft are more uncertain as to whether they should develop the data-mining platform to gain extra revenue. If they do, what should they mine and how should they prevent themselves from breaching privacy laws? This report will outline the issues Twitter’s founders are facing and give three options the company can undertake to achieve its goal, followed by a recommendation. This report will also evaluate Canada’s privacy law – PIPEDA and examine how Twitter’s Privacy Policy complies with the PIPEDA. Stakeholders and Preferences Founders of Twitter: Jack (Chairman), Evan (CEO) and Biz (Creative Director) want to their company to grow and succeed in the long run. As well, they want to find a safer way to utilize the database, which contains personal information and personal messages, to generate revenue, and respect their legal and ethical obligation to their users at the same time. Users of Twitter: They use Twitter to share personal information and keep their followers up to date with new events. They want to make sure the company is protecting their privacy and their personal information is not being used in any unethical or illegal way. The two Partners: Google and Microsoft are both very interested in the data-mining project as they see the potential of generating large amount of revenue. They work with Twitter to find a way to effectively use data to generate revenue. Meanwhile, they are both concerned over privacy issues, given the sensitive information they are dealing with. Regulators: Oversee Twitter from a legal perspective. They provide guidelines on how to use personal information in a way that protects Twitter users’ privacy. They make sure Twitter follows the privacy laws and they actively make changes to the law to deal with arising issues. Government: They make sure Twitter practices its business under the laws and make sure that Twitter provides benefit to the society, instead of harm. Other Developers and Marketers: Developers, such as SalesForce. com, develop application for other organizations to take advantage of Twitter’s public tweets as a way of making profit. Marketers want to use Twitter’s information to make money as well. They depend on valuable information they obtain from Twitter to make money and would not want Twitter to take a way this right/ this market. Issues Facing the Founders of Twitter Issue 1: Company’s lack of long term revenue generating plan Twitter’s main source of capital is from venture capital and promotional tweets. In order for Twitter to survive in the long term, they should open up more channels to generate revenue so they are able to grow and provide better service to their 100+ million users. In addition, it will help them stay competitive in the social networking service industry. Company is facing difficulty in coming up with a revenue generation plan to make their business more sustainable and profitable in the long run. Issue 2: How to use the data obtained in a legal and ethical way Twitter has a database with abundant data. The issue that Twitter is facing right now is efficiently utilizing the data and turning it into revenue. After examining the failure due to misuse of users’ personal information by Google and Facebook, Twitter is more concerned about the legal and ethical issue in using user’s sensitive information to generate revenue. Issue 3: Raising concern over privacy by the governments, regulators and users The company needs to be more cautious when dealing with personal information or personal tweets in this nature. Moreover, different countries have their own privacy laws. Twitter needs to follow multiple privacy laws closely to avoid potential lawsuits. This creates additional difficulty for Twitter since they have users from all over the world. Issue 4: Lack of specific company policies to protect information ethics and information privacy if it decides to develop the platform for data-mining The company needs detailed policies to protect information ethics and information privacy when implementing a data mining platform. Lack of consideration in this area will put the company in danger, following severe consequences. Issue 5: Not fully using its own resources Many developers already developed many applications that use Twitter’s public tweets to generate profit. However, Twitter is still holding on to all of the precious data and not utilizing it. Twitter is going to lose its competitive advantage if they don’t take the necessary steps soon. Twitter will have to compete with developers in the future in terms of application development for its’ users. Issue 6: Security breaches, code cracking and hackers They bring a huge threat to Twitter’s online information safety and its reputation. As a result, many users may lose confidence to the company and eventually withdraw. Twitter will not only lose a significant amount of users, but also become less attractive to the investors. The company may face bankruptcy if the situation severs. Management needs to come up with enhanced technologies to fight against the threats from code crackers and hackers. Options for Twitter’s management Twitter’s general goal stated in the case is to â€Å"monetize their business model while concurrently respecting their legal and ethical obligations to their users†. Following are some of the options management can consider to achieve this goal. Option 1: Establish an in-house data mining division. This division will take requests from external marketers and convert related data into information through consolidation and sell the aggregated information to marketers. Twitter will disclose the purpose of collecting this data on their website and give opt-in option to users. Pros: Twitter can sell the requested information to marketers to generate a significant amount of revenue. The information can also be sold to people in other fields, such as anthropologists and sociologists. These people can use the information to better the study of human behaviour, which will benefit the society as mentioned in the case. In other words, the potential market for Twitter is very broad. The information extracted from the data will help Twitter make better corporate decisions, better customer service and perhaps open up more business opportunities for the company in the future. Another big benefit to this option is that it will not breach user’s privacy as the information is consolidated, which means the marketers will not see individual’s private information. The disclosure of the purpose of collecting the data along with the opt-in option will make Twitter further in compliance with the privacy law. Cons: There will be additional risk associated with this option because it is a new venture for the company with no prior experience. The company needs to spend more effort to establish rules and carefully oversee the entire operation to avoid risks. This option requires money. The company needs to spend money in hiring and providing training to division manager, supervisors and employees to carry out the operation. In addition, any work related to data mining will expose the company to some degree of privacy and security issues. Although this option can eliminate a big portion of these concerns, issues can still arise that will hurt the company in the long run if not handled properly. Option 2: Give users the option to opt-in of releasing some private data that are non-identifiable such as age, gender, or general location in exchange for small incentive such as extra tweet characters. Sell those non-identifiable private data in addition to the public data such as public tweets directly to external marketers, while keeping the identifiable private data such as user address or private tweets. Twitter will disclose the purpose of collecting these data on their website. Pros: This option definitely respects user’s concern over privacy issues because it provides users the option to opt-in of releasing their non-identifiable private data to third party. Although the marketers can collect the public data, it’s time consuming to develop a legal third party program that will go over all the pages and all the tweets from different individuals. The option provides marketers the convenience to collect data. Twitter can obtain revenue from this service and reduce the level of concern over privacy and legal issues. Cons: Twitter may face intense competition over this option. One reason is that some tech companies already developed applications for extracting public information to help marketers collect useful public data/ tweets. Some companies even help the marketers to monitor conversation on Twitter and bring important tweets to the attention of the company. If there are already many competitions in the market, Twitter might have to lower the price to compete with them. This will effect their revenue generation. Another concern is if the marketers misuse the data, Twitter will be held responsible. If people don’t trust Twitter and withdraw from the website, Twitter will lose revenue. Therefore, risks still exist to a certain extent. Option 3: Do not do anything with the data. Keep them for internal business development purpose. Find alternative ways to generate revenue such as adding advertisements on user’s homepage Pros: This is the safest option out of the three. This option illustrates that Twitter has good business ethics and has strong sense of protecting users’ privacy. This not only helps Twitter in building up the company’s reputation, but also establishes trust relationship with users. As for the advertisements, it’s the company’s own responsibility to target their customers, but will definitely need to get approval from Twitter. Twitter will give users the option to display advertisement on their page and share the profit with the user as an incentive. This way, Twitter shows their respect to users and it’s a win-win situation for both parties. Cons: Twitter will not be utilizing their data resources to its full potential because they will be only using it for internal business development. Also, this option may not help Twitter in generating sufficient revenue as their income depends on the users’ willingness to display advertisement on their homepage. This is an external factor that is out of management’s control. Recommendation After evaluating all the options, I would recommend option 1- which is to execute a data-mining division, analyse the data and sell out the aggregated information to the marketers. This option gives the company more opportunities to generate revenue because it allows hem to use its data resource to the full potential, also reduce the risk of breaching the privacy laws. The company needs to have a detailed and thorough implementation plan in order to get the best results out of this option. Below are the recommendations for this option. Install employee monitoring system in the new division: The company is liable for their employees’ actions and the risks they take, (especially with the user’s sensitive information t hey are handling) therefore, monitoring is necessary. The company must communicate the purpose behind this division and what actions are being monitored to its’ employees. This will prevent How to cite Privacy and Twitter, Essay examples

Friday, December 6, 2019

Method Integrating The Anomaly Detection -Myassignmenthelp.Com

Question: Discuss About The Method Integrating The Anomaly Detection? Answer: Introduction The network intrusion detection system (IDE) is a system that helps in detecting various attacks in the network system. IDS can be placed on any network that helps in collecting data and information for providing security to the networks. Algorithms are required in order to perform detection of attacks in a network system. The Next Generation Intrusion Detection Expert System (NIDES) has helped in maintaining the security of the network system by the use of the psychology and statistical model. The use of IDS has helped in maintaining the security of the data and information in the network server of the company [1]. This method comprises with detection rate of both known and unknown attacks is enhanced. There are some proposed intrusion detection algorithms including decision tree, one-class support vector machine and hybrid intrusion detection method. Decision tree method works on divided and conquers method with a recursive procedure. The primary application of the Decision tree algorithms are for providing data and divide into corresponding classes. Where Gain(S, A) is gain of set S after a split over the A attribute; Entropy(S) is the information entropy of set S. The entropy is as follows: A one-class support vector machine has been used by a various organization in order to protect from network attacks. The algorithm of this system is as follows: Where w is vector orthogonal to hyperplane, n = [n1,.. nl] is vector of slack variables used to penalize rejected instances, and q represent margin, i.e. distance of the hyperplane from origin. The detection rate of hybrid detection methods can be more than 99% without considering performance of first-class SVM model. Next step is testing step of algorithms using the MATLAB. The training time of proposed algorithms is measured to analyze the time complexity. Therefore, the use of these algorithms might help in maintaining the security of the network system. Different viruses and malware are detected with the helped of the network intrusion detection system in the network system. The use of the multi-core parallel system has helped in creating a favourable condition for computing systems and its networks References [1] Kim, Gisung, Seungmin Lee, and management Kim. "A novel hybrid intrusion detection method integrating anomaly detection with misuse detection." Expert Systems with Applications 41, no. 4 (2014): 1690-1700.